Science topic
Cyber Security - Science topic
Explore the latest publications in Cyber Security, and find Cyber Security experts.
Publications related to Cyber Security (10,000)
Sorted by most recent
Dear colleagues!
Southern Federal University, together with Manipal University Jaipur (India), informs about International Conference on Cyber Warfare, Security & Space Computing (hereinafter SpacSec'25) on September 26-28, 2025.
The main goal of SpacSec’25 is to share experience and knowledge, strengthen international cooperation and develop advan...
We invite contributions for the IEEE CH workshop: 'Protecting the Future of Cultural Heritage: Digital Twins for Sustainable Preservation'. Cultural heritage faces significant challenges due to environmental, climatic, anthropogenic and digital threats. Innovative digital solutions such as digital twins, AI and multimodal data fusion for monitoring...
In recent years, OPC UA has risen in popularity as an abstraction technology for legacy protocols used in OT (Operational Technology) and SCADA systems, which often lack the security features required for secure remote communication with devices and sensors. However, deploying secure OPC UA servers is not trivial, and many servers end-up facing the...
This paper explores the integration of blockchain
based Self-Sovereign Identity (SSI) technologies into Industrial
Automation and Control Systems (IACS) to strengthen cyber
security and operational resilience. After an overview of the
threats facing industrial systems, we present a logical framework
for a layered defense incorporating SSI. The logi...
The systemic nature of climate risk is well established, but the extent may be more severe than previously understood, particularly with regard to cyber risk and economic security. Cyber security relies on the availability of insurance capital to mitigate economic security sector risks and support the reversibility of attacks. However, the cyber in...
Incident response (IR) is the process of detecting the existence of a threat and minimizing its impact. The incident response team needs to work proactively to defend the network against cyberthreats. Streamlining and automating the threat response process will achieve this goal and enhance the incident response workflow. Automating important use c...
Zimbabwean’s commercial banks and micro finance institutions are grappling with significant operational losses due to inadequate cybercrime mitigation frameworks and effective risk management frameworks, leaving them vulnerable to cyber threats. Mashizha and Kanengoni (2024), Katuri (2023) and Vusumuzi (2024) noted that cybercrime mitigation framew...
As part of their digital transformation, financial service companies can greatly benefit from the implementation of a microservice architecture. We can build a service-oriented architecture (SOA) application using the architecture to enhance its overall performance and maintainability. This enables the application to consist of several smaller comp...
In today's hyper-connected society, the prevalence of cyber-attacks and Cybercrime has escalated to a critical level, posing significant threats to individuals, organizations, and nations. This essay aims to provide a comprehensive examination of the nature and implications of cyber threats. It begins by defining key concepts and categorizing vario...
The research deals with a group of problems and breakthroughs in the previous period and the largest attacks in history that caused failures in technical systems around the world. The research discussed cyber-attacks and disruptions and how to deal with them, better understand the difference, and enhance cyber security. Through the research, many e...
Hybrid warfare may incorporate a wide range of abilities, conventional
capabilities, irregular tactics and formations, indiscriminate violence and criminal
disorder. All of these undoubtedly can jeopardize the political stability, the
economic growth and the availability of essential services. As hybrid warfare is
found to be actively used by N...
In the digital age, young people are increasingly engaging with online information, making internet literacy one of the most critical skills. However, the rapid proliferation of digital content has also led to the rise of misinformation, cyber threats, and manipulative online tactics. This article examines pressing issues in enhancing internet lite...
The integration of large language models (LLMs) into cyber security applications presents significant opportunities, such as enhancing threat analysis and malware detection, but can also introduce critical risks and safety concerns, including personal data leakage and automated generation of new malware. We present a systematic evaluation of safety...
Artificial Intelligence (AI) plays an important role in enhancing data security by identifying threats and responding to them effectively. This paper explores how AI-directed security will help in data protection by identifying dangers, reducing cyber risks, and ensuring real-time threat management. AI-driven tools such as machine learning-based an...
Recent digital transformation has increased cybersecurity challenges by introducing new vulnerabilities. Such vulnerabilities could be exploited to undermine the objectives of UNSCR 1540. This paper examines how cyber threats-ranging from sophisticated hacking and ransomware attacks to weaknesses in digital supply chains and financial systems-pose...
Precision agriculture, which combines modern technology with conventional farming techniques, has significantly transformed the efficient use of water, soil and farm resources. This chapter examines the dynamic 182 relationship between technology and security within this particular industry , with a specific emphasis on emerging technologies such a...
The Indo-Pacific, a region covering over 60% of global economic output, is not only a geopolitical nexus but also an epicenter for the growing risks and challenges posed by cyber threats. As countries within this region continue to expand their digital footprints, the vulnerability of their critical infrastructure to cyberattacks has reached record...
يسعى البحث الى معرفة كيفية بناء الاستراتيجية الوطنية للأمن السيبراني في المديرية المبحوثة بأبعادها (الحكومة الفعالة , البعد التشريعي والتنظيمي , تكنولوجيا الامن السيبراني , ثقافة الامن السيبراني , البحث والتطوير , الامتثال والتنفيذ , الجاهزية , التعاون الدولي ) من خلال التركيز على التخطيط الاستراتيجي في المديرية المبحوثة بأبعاده (الرؤية الاستراتيجي...
Southeast Asian countries or Association of Southeast Asian Nations (ASEAN) and India used to have strong diplomatic, political, economic, and cultural ties and grown phenomenally. These two neighbouring regions share many common interests and ideas to increase interregional cooperation. There are many examples of cross connectivity projects such a...
Against the backdrop of the "dual-carbon" goal, the global energy transition and drastic changes in the geopolitical landscape, the strategic position of natural gas as a key low-carbon transition energy source has become increasingly prominent, and the security and resilience of its trade network has become a core issue in guaranteeing China's ene...
This paper discusses the benefits of integrating cybersecurity and resilience in educational management in Nigeria. The paper is a review paper that depends on secondary data. The secondary data were collected from print and online publications. The paper concluded that a stable academic programme, protection of academic records, and protection of...
The aim of this paper is to assess cyber security stability and identify effective strategies. The study collects multi-dimensional data such as crime rate and crime success rate and uses entropy weight method to construct a stability assessment model. On the basis of the traditional entropy weighting method, the weights are set manually to combine...
The escalating frequency and complexity of cyber threats have pushed enterprises to adopt more resilient and intelligent cybersecurity mechanisms. This paper explores the integration of Artificial Intelligence (AI) with API-driven security frameworks and adaptive architectures to create dynamic, self-learning, and scalable security ecosystems. Thro...
ORCID Petar Yordanov-https://orcid.org/0000-0003-3860-6019 Nina Klenovska-https://orcid.org/0009-0009-9075-5717 Ivailo Mihailov-https://orcid.org/0009-0001-0585-3390 РЕЗЮМЕ Киберсигурността в спорта е важна тема, която става все по-актуална и е съсредото-чена около защитата на спортните системи и личните данни на спортистите. Целта на това проучван...
Malicious URLs and websites continue to undermine online security, with search engines inadvertently becoming platforms for fraudulent sites. Traditional phishing detection methods often based on white lists, blacklists, or single-model approaches fail to address the evolving sophistication of phishing attacks. This persistent threat highlights the...
Disclosure of cyber risks is predominantly important, as the importance of cyber risk disclosure decisions has increased due to the large number of attacks and breaches that have affected companies' data and information. This analysis aimed to contribute to the scientific discussion to clarify the challenges facing companies in disclosing cyber ris...
In the rapidly evolving digital landscape, the integration of Cyber Security, Artificial Intelligence (AI), Machine Learning (ML), and Information Security has become imperative for developing robust and adaptive defense mechanisms. The traditional siloed approach to digital security is no longer sufficient to counter increasingly sophisticated cyb...
Security Operations Centers (SOCs) face growing challenges in managing cybersecurity threats due to an overwhelming volume of alerts, a shortage of skilled analysts, and poorly integrated tools. Human-AI collaboration offers a promising path to augment the capabilities of SOC analysts while reducing their cognitive overload. To this end, we introdu...
The Smart Grid (SG), as the next generation of efficient and intelligent electric power transmission networks, is driven by the Internet of Things (IoT). However, Smart Meters (SMs) within the SG environment often rely on unsecured public channels to exchange data and services, posing significant security risks. This manuscript proposes Blockchain...
The time window between the disclosure of a new cyber vulnerability and its use by Cyber criminals has been getting smaller and smaller over time. Recent episodes, such asLog4j vulnerability, exemplifies this well. Within hours after the exploit being released, attackers started scanning the internet looking for vulnerable hosts to deploy threats l...
The use of information technology and related processes has permeated into organizations of all sizes. Higher learning institutions are described as open, multi-modal platforms whose organizational complexity can increase vulnerability to information security breaches. Several high-profile cyberattacks have occurred on universities and colleges, in...
Integration of communication networks and Shipboard Microgrids (SHMGs) brings significant benefits in the advanced control, monitoring, and remote diagnostics, particularly facilitating the data exchange between various generation components, such as sustainable energy resources, energy storage systems, and connected loads. However, the utilization...
Law firms operate in a rapidly evolving financial landscape where profitability depends on strategic planning, cost control, and innovative revenue models. Traditional billing methods are giving way to alternative fee structures like fixed and value-based pricing, driven by changing client expectations. Rising operational costs, increased competiti...
Artificial intelligence has created much impact in so many scientific and engineering fields because of its ease, versatility and capability to be adopted to suit different applications. Concerns have arisen for online applications which can be exposed to cyber threats. The various benefits expected to be derived from online application of Artifici...
Cybersecurity has become essential worldwide and at all levels, concerning individuals, institutions, and governments. A basic principle in cybersecurity is to be always alert. Therefore, automation is imperative in processes where the volume of daily operations is large. Several cybersecurity applications can be addressed as binary classification...
Abstract
In the contemporary period, the problem of Cyber security has come to apply as a growing
phenomenon. It produces so many constrain, involving business sector to technological sphere then in
our daily way of living. However, the global community are largely being victimized by these
problems. The effective measures of states government...
Tensor networks, a class of variational quantum many-body wave functions have attracted considerable research interest across many disciplines, including classical machine learning. Recently, Aizpurua et al. demonstrated explainable anomaly detection with matrix product states on a discrete-valued cyber-security task, using quantum-inspired methods...
Electric vehicle (EV) charging stations on the smart grid are needed to promote electric car adoption and sustainable transportation. The key issues are the lack of continuous monitoring and incident response, difficulty linking smart grid systems with EV charging stations, and security gaps that may not address particular vulnerabilities. Modern s...
Purpose This study investigates the relationship between young professionals' perceptions of cyber security and their level of online shopping on e-commerce platforms in Koronadal City. Study design/methodology/approach A descriptive-correlational research design was employed to assess the socio-economic profile, cyber security concerns, and person...
As cyber threats increase and regulations become more stringent, cybersecurity has become a fundamental component of ERM, making it imperative to move from peripheral reactive approaches to integrated compliance-based models. The current research focuses on the complicated incorporation of cybersecurity governance into ERM systems, including its op...
The mushrooming adoption of microservice architecture in modern software engineering certainly resulted in a substantial boost in scalability, deployment flexibility, and system resilience. Nevertheless, it has also given rise to excessively extensive security concerns owing to its inherent distribution of communication among one or more high visco...
This paper develops a hybrid model for strategic decision-making in contexts of radical uncertainty. It combines the formal structure of game Theory with the epistemological principles of the Austrian School of Economics. The Subjective Dynamic Decision Model (SDEM) describes decisions not as the result of rational optimisation, but as the result o...
Over previous years, the Internet of Things (IoT) made to connect multifaceted things to the internet. It has led to a digital disturbance when by alternating method is utilized. It led to digital interruption through exchanging methods of expertise is used. Numerous industries, such as Smart Health Care (SHC) transport as well as smart grids have...
Information technology (IT) is widely utilized at rig sites, with its growing volume and complexity introducing potential errors that may lead to system failures. While various studies propose preventive solutions, human errors remain a leading cause of system failures and cybersecurity vulnerabilities. Investigating the factors contributing to the...
As digital transformation accelerates across industries, cyber security has emerged as both a critical enabler and a complex challenge. This paper explores the technological advancements, structural challenges, and strategic frameworks essential for robust cybersecurity in the modern digital ecosystem. Emphasizing literature and supported by tables...
Cryptocurrency has emerged as a significant factor in contemporary geopolitics, presenting both opportunities and challenges for international diplomacy. As digital assets continue to gain traction globally, their impact on geopolitical conflicts is becoming increasingly apparent. This paper aims to explore the growing importance of cryptocurrency...
2025 Undergraduate Graduation Project: An awareness campaign on cyber-extortion and on knowledge and understanding of cybersecurity. The campaign targeted youth and adolescents. The campaign included 4 videos, 13 advertisements, 8 brochures, 8 leaflets, 3 booklets, one seminar, and personal contact with students to raise their awareness of cyber-ex...
The proliferation of mobile devices and their dependence on the android OS has made them prime targets for cybercriminals, leading to an escalating threat of malware. This study addresses the growing need for effective malware detection methods by exploring the application of machine learning (ML) techniques to enhance the security of Android devic...
The article deals with the issue of maritime security teaching while e-learning for future ship engineers. An innovative interactive module designed to educate and engage future ship engineers in the vital area of digital security within the context of Maritime English is presented. LMS MOODLE online course is described, particularly the module dev...
The increasing reliance on the internet by billions worldwide has made cyber security a vital concern. Among emerging security solutions, intrusion detection technologies have gained importance for their ability to monitor systems and prevent unauthorized activities. These systems use localized network mechanisms to continuously observe user behavi...
The issue of cyber security is becoming more and more important today, so this factor must be taken into account by all governments, because threats in the field of information technology are no less important than threats in any other sphere of state activity. So, cybersecurity is the state or process of protecting and recovering computer systems,...
In the current cyber security environment in which APTs and attack vectors have preeminence, traditional detection controls tend to deliver false and tardy threat detection. This document describes an end-to-end solution that integrates advanced analytics, response automation procedures, and diverse sources of data in order to build up threat intel...
With the emergence of artificial intelligence, cyber threats have become increasingly complex. Traditional cyber security measures are insufficient to cope with new cyber threats. In order to defend against advanced threats, businesses are now obliged to adopt proactive defense strategies. One of the proactive defense strategies is the integration...
The study focused on cognitive dissonance and cyber-fraud behaviour among university students in Nigeria. Three research questions were raised in the study. The study adopted a qualitative and quantitative survey method. The population for this study comprised of all university students in Nigeria. A stratified sampling technique was employed in th...
In the ever-evolving landscape of cyber security, technological defenses alone are insufficient to protect sensitive information and systems. Social engineering, a manipulation technique that exploits human psychology, has emerged as one of the most significant threats to information security. This article aims to provide a comprehensive understand...
Vehicular networks utilize wireless communication among vehicles and between vehicles and infrastructures. While vehicular networks offer a wide range of benefits, the security of these networks is critical for ensuring public safety. The transmission of false information by malicious nodes (vehicles) for selfish gain is a security issue in vehicul...
The development of quantum computing technologies represents a critical risk for virtually all classical encryption systems (RSA, AES, ECC) and cybersecurity will sustain immense damage. RSA and AES in total depend on modern cyber security as they use factoring and discrete logarithm problems whose solving is perilous via quantum algorithms like Sh...
Background: African health care Systems are confronted by continuing infrastructure disparities or lack of capacity about the workforce and unequal access to care. To address these challenges, artificial intelligence (AI) and data governance frameworks have become the change makers in the health sector, especially in the wake of the African Union C...
Objectives: The study aimed to identify and understand the challenges of Iraqi national security in confronting cyber terrorism and work to provide the most important ways to enhance cyber security in Iraq. Methodology: To understand the research hypothesis and answer the questions raised in the problem, the study used systems analysis and inductiv...
Cybersecurity involves protecting computer networks, systems, and data from unauthorized access and disruptions using advanced technologies. The purpose of this research is to establish a novel cyber security framework for strengthening cloud data protection. In this paper, we propose a novel Dung Beetle optimization-redefined Intelligent Random Fo...
The research paper investigates the increasing trend of cybercrimes in India due to rapid digitization. It aims to analyze historical cybercrime data (2016–2018) using machine learning techniques to identify trends and predict future crime rates. The study utilizes datasets from Kaggle, applying Power BI for data visualization and predictive analys...
In order to improve efficiency and creativity, the pharmaceutical sector is going through a major digital revolution that contains the broad use of digital technologies including cloud computing, IoT devices, EHR systems, and artificial intelligence. Although this change presents new prospects, it also makes the industry more susceptible to sophist...
Cyber security is facing a huge threat from malwares motivator and their mass production due to its mutation factors, which results in enormous production of these binaries in short time. Moreover, the domain of malicious intents is also progressing with the increase of compute intensive resources. To detect and highlight these malicious binaries,...
Malware detection and recognition would function as cyber threats. Understanding that it includes zero day exploits, code obfuscation, and therefore it would be like Role Malware- detection Indicators. Under Cyber security concerning multiple threat models like zero-day exploits and code obfuscation. Study at present on this condition recognizes gr...
While human factors are important in cyber security, the discipline has largely not explored incorporating indigenous perspectives—or, more specifically, in an Australian context, Aboriginal perspectives—in its curricula. In this paper, we introduce a promising approach for aligning Aboriginal perspectives with the needs of cyber security graduates...
[ITALIAN] Industrial Cyber Security: regolamenti e tecnologie di difesa per prevenire il rischio cyber
This study strives to establish salient relationship between cyber crime and business performance, the 4 th industrial revolution (4IR or Industry 4.0) surely has Artificial intelligence (AI) embedded in it, a key subset of AI that is shaping and will further shape the marketplace is Machine learning (ML). This study has leveraged ML in establishin...
In light of rapid technological developments, a marked rise in global internet usage has contributed to increased sensitive data flow across networks. This increase leads to the diversification of malicious attacks and makes cyber security requirements more evident. In order to ensure network security, intrusion detection systems stand out as an es...
There are various forms of cyber security attacks that target computer networks and systems with the
aim of destroying important data, files, documents or systems to control them or gaining access to a
computer network or institution. Internet attacks are common and an interesting topic due to the devel
opment and diversity of the methods and means...
As communication and information technologies are integral to everyone’s daily activities, the significance of cybersecurity has become more pronounced due to the growing vulnerability of these technologies to cyber threats. Traditional cyber security systems use various preventive measures to secure the information and trust authentication methods...
Adversarial machine learning has become a significant threat in the area of cybersecurity since machine learning models utilized for tasks, including intrusion detection, malware classification, and phishing identification, are highly susceptible to adversarial attacks. These include model evasion and poisoning where the adversaries target the flaw...
This work empirically evaluates machine learning models on two imbalanced public datasets (KDDCUP99 and Credit Card Fraud 2013). The method includes data preparation, model training, and evaluation, using an 80/20 (train/test) split. Models tested include eXtreme Gradient Boosting (XGB), Multi Layer Perceptron (MLP), Generative Adversarial Network...
Seamless information exchange is crucial in healthcare due to the integration of computational systems. The increased use of Personally Identifiable Information (PII) in digital healthcare raises privacy and security concerns. Threat Modeling Methodologies (TMMs) have emerged to address these challenges by locating and resolving cyber security thre...
Bug bounty is one of the programs in the field of Cyber Security with the purpose to finding and uncovering vulnerabilities in technology company ecosystem. Researcher focusing on the security field will play a critical role to the success of bug bounty program with their expertise in security system and deep understanding of the technology. The pu...
The main purpose of this study is to investigate the significance of artificial intelligence applications and the most widely used of these, ChatGPT, in foreign language learning and teaching and in this context, to obtain the perspectives of both students and teachers. Since there is no research on this subject in Iraq, this study will be a good s...
Despite the transformative impact of Artificial Intelligence (AI) across various sectors, cyber security continues to rely on traditional static and dynamic analysis tools, hampered by high false positive rates and superficial code comprehension. While generative AI offers promising automation capabilities for software development, leveraging Large...
Class Imbalance Problem is a prevalent challenge in Internet of Things (IoT) intrusion detection, and deep learning models are prone to favor a larger number of classes leading to a severe degradation of the detection performance. To overcome the class imbalance problem and enhance the feature representation, we propose a novel IoT intrusion detect...
This research examines the digital transformation of Islamic banking in the context of technological development. Using a qualitative methodology based on literature review from various scientific sources, this study shows that Islamic banks have undergone significant evolution from conventional systems based on physical interaction to digital serv...
This paper presents a synchrophasor‐based real‐time cyber‐physical power system testbed with a novel security evaluation tool, pySynphasor, that can emulate different real attack scenarios on the phasor measurement unit (PMU). The testbed focuses on real‐time cyber‐security emulation using different components, including a real‐time digital simulat...
Este trabalho tem como seu principal com objetivo de identificar os mecanismos de proteção da informação que são usados nos bancos de dados. Chegou aos objetivos especificações, quais são as tecnologias mais usadas atualmente para a proteção de dados. Como são tratadas pela inteligência artificial a manipulação dos dados fornecidos pelos, os usuári...
Higher education system in any economy whether developing or industrialized is one of the major pillars on which national security stands because, among other factors, it ensures the continuous availability of professionals in critical areas of national security and general development needed from policymaking to execution. In the same vein, nation...
Technological developments have seen a rapid evolution in the last decade. The complexity and cyber-attacks increase within the advancement of technology and artificial intelligence, this creates pressures for corporations to adopt the necessary methods to ensure they function in a safe environment. This study attempts to assess the role of manager...
The Software Defined Networking (SDN) method has evolved to project future systems and collect novel application needs for several years. SDN delivers sources for enhancing management and system control by splitting data and control plane, and the control logic is federal in a controller. Conversely, the central logical control is a perfect objecti...
In the 21st century, the virtual space becomes one of the most important areas of human life, which has created challenges for humans to regulate with the rapid evolution and expansion of emerging and converging technologies. This article examines the challenges of emerging regulatory technologies in cyberspace, especially in the Islamic Republic o...
Globalisation has transformed the way people live, work, and interact. In recent decades, businesses of all sizes have been profoundly affected by exponential computer, network, and data storage technology advances. Virtually all industries, from the healthcare to the automotive sector, have integrated digital technologies into their work. This phe...
The European regulatory momentum, combined with the growing sophistication of cyber threats, is driving companies to conduct an in-depth evaluation of their risk management strategies and regulatory compliance frameworks. In this context, security awareness and corporate social responsibility (CSR) emerge as strategic pillars for developing an inte...
Artificial intelligence (AI) is rapidly transforming financial systems worldwide, particularly in Africa and Nigeria, by automating regulatory compliance, enhancing fraud detection, and improving risk management. However, integrating AI into financial regulations comes with both potential and challenges. This article examines the impact of AI-drive...
The exponential growth in wireless connectivity has escalated the risk of security breaches, particularly in public Wi-Fi environments. Traditional threat detection methods often struggle with the real-time processing requirements needed to identify and mitigate such threats effectively. This study investigates the optimization of two prominent ass...
Abstract—The Internet of Vehicles (IoV) system faces some
security vulnerabilities, which could lead to cyberattacks
targeting smart vehicles. This paper investigates the
cybersecurity challenges of IoV, focusing on defending smart
cars from covert attackers. The primary aim of the study is to
design a robust security system to combat and prev...
The rapid growth and anticipated future expansion of medical devices in healthcare bring with it
an increase in cyber security risks. Current cyber security risk assessment methods use
frameworks that are not frequently updated and are not specific to the healthcare sector. This
study explored the feasibility of using MITRE ATT&CK in conjunction wi...
An increasingly aging population, widespread internet connectivity, and an increasing number of cybersecurity incidents bring many challenges for the future of information security. Older adults, in particular, are a highly vulnerable demographic, often targeted by cyber attackers. This paper aims to develop an approach that enables the identificat...
The proliferation of public Wi-Fi networks has significantly increased the risk of phishing attacks, posing serious threats to user privacy and data security. This study explores the application of Association Rule Mining (ARM), a fundamental data mining technique, for the preemptive detection of Wi-Fi phishing attempts. By analyzing patterns in ne...
The proliferation of public Wi-Fi networks has led to an increase in cyber security threats, particularly Wi-Fi phishing attacks. These attacks, often orchestrated through deceptive networks, pose significant risks to sensitive user data. This paper presents a novel framework for detecting and mitigating nascent Wi-Fi phishing threats using Associa...
The progression of artificial intelligence (AI) technologies has reached a level that greatly enhances the different organizational sectors by facilitating them with the means to advance and improve systems and processes. Shadow AI implies the usage of AI tools and systems by individuals within an entity, respectively, without permission thereby im...
The protection of critical infrastructures (CIs) from cyber–physical threats and natural hazards has become increasingly vital in modern society, which relies heavily on the essential services provided by these infrastructures. The European Union has emphasized the importance of this issue by deploying a comprehensive policy package in 2022, includ...
Wi-Fi phishing attacks pose significant threats to users of public wireless networks, exploiting the absence of robust detection mechanisms. This paper presents an integrated early warning system that leverages Association Rule Mining (ARM) in conjunction with Network Behavior Analytics (NBA) to proactively identify and mitigate phishing threats in...
Businesses have invested billions into artificial intelligence (AI) applications, leading to a sharp rise in the number of AI applications being released to customers. Taking into account previous approaches to attacking machine learning models, we conduct a comparative analysis of adversarial attacks, contrasting large language models (LLMs) being...
The so-called Islamic State (IS) has always had a strong online presence. The purpose of most IS propaganda is to shape perceptions and polarise the support of their audience, but there are also other forms of communication from the group and its supporters. In this paper, we present an analysis of the content from two IS-aligned media outlet on Te...
Incident management is a classical topic in cyber security. Recently, the European Union (EU) has started to consider also the relation between cyber security incidents and cyber security crises. These considerations and preparations, including those specified in the EU's new cyber security laws, constitute the paper's topic. According to an analys...